CVE-2026-3723
📋 TL;DR
This SQL injection vulnerability in Simple Flight Ticket Booking System 1.0 allows attackers to manipulate database queries through the flightno parameter in /Admindelete.php. Remote attackers can potentially access, modify, or delete database contents. All deployments of version 1.0 are affected.
💻 Affected Systems
- code-projects Simple Flight Ticket Booking System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, data destruction, and potential remote code execution via database functions.
Likely Case
Unauthorized data access, modification of flight booking records, and potential privilege escalation.
If Mitigated
Limited impact with proper input validation and database permissions, potentially only error messages exposed.
🎯 Exploit Status
Exploit details are publicly available. SQL injection via flightno parameter is straightforward.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://code-projects.org/
Restart Required: No
Instructions:
No official patch available. Consider upgrading to a newer version if available, or implement workarounds.
🔧 Temporary Workarounds
Input Validation and Sanitization
allAdd parameter validation and use prepared statements for the flightno parameter in Admindelete.php
Replace vulnerable SQL queries with prepared statements using PDO or mysqli
Web Application Firewall (WAF)
allDeploy WAF rules to block SQL injection patterns
Configure WAF to detect and block SQL injection attempts
🧯 If You Can't Patch
- Restrict access to /Admindelete.php using IP whitelisting or authentication
- Implement database user with minimal permissions (read-only if possible)
🔍 How to Verify
Check if Vulnerable:
Test /Admindelete.php with SQL injection payloads in flightno parameter (e.g., flightno=1' OR '1'='1)
Check Version:
Check application version in source code or documentation files
Verify Fix Applied:
Test with same payloads and verify no SQL errors or unexpected behavior occurs
📡 Detection & Monitoring
Log Indicators:
- SQL syntax errors in web server logs
- Unusual database queries from web application
- Multiple failed parameter validation attempts
Network Indicators:
- HTTP requests to /Admindelete.php with SQL keywords in parameters
- Unusual database traffic patterns
SIEM Query:
web.url:"*/Admindelete.php*" AND (web.param.flightno:"*'*" OR web.param.flightno:"*OR*" OR web.param.flightno:"*UNION*")